Applying the Composition Principle to Verify a Hierarchy of Security Servers.
Mark R. HeckmanKarl N. LevittPublished in: HICSS (3) (1998)
Keyphrases
- hierarchical structure
- information assurance
- higher level
- security issues
- intrusion detection
- network security
- security problems
- lower level
- data center
- information security
- access control
- computer networks
- databases
- statistical databases
- security level
- information sharing
- security policies
- cloud computing
- computer security
- security properties
- malware detection
- security vulnerabilities
- data mining